default search action
Janusz Górski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [p4]Janusz Górski, Andrzej Wardzinski:
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components. Resilience of Cyber-Physical Systems 2019: 71-87 - 2018
- [j11]Janusz Górski, Marek Kaminski:
Towards automation of IT systems repairs. Softw. Qual. J. 26(1): 67-96 (2018) - [c31]Geir Kjetil Hanssen, Thor Myklebust, Janusz Górski:
Session details: ASCS: 4th international workshop on agile development of safety-critical software. XP Companion 2018 - [c30]Katarzyna Lukasiewicz, Janusz Górski:
Introducing agile practices into development processes of safety critical software. XP Companion 2018: 13:1-13:8 - [c29]Geir Kjetil Hanssen, Thor Myklebust, Janusz Górski:
A summary of the 4th international workshop on agile development of safety-critical software (ASCS 2018). XP Companion 2018: 15:1-15:2 - 2017
- [c28]Janusz Górski, Katarzyna Lukasiewicz:
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. MMM-ACNS 2017: 3-15 - 2016
- [c27]Katarzyna Lukasiewicz, Janusz Górski:
AgileSafe - a method of introducing agile practices into safety-critical software development processes. FedCSIS 2016: 1549-1552 - 2013
- [c26]Janusz Górski, Aleksander Jarzebowicz, Jakub Miler:
Comparative Conformance Cases for Monitoring Multiple Implementations of Critical Requirements. SAFECOMP 2013: 8-20 - [c25]Janusz Górski, Katarzyna Lukasiewicz:
Towards Agile Development of Critical Software. SERENE 2013: 48-55 - 2012
- [j10]Janusz Górski, Katarzyna Lukasiewicz:
Assessment of Risks introduced to Safety Critical Software by Agile Practices - a Software Engineer's Perspective. Comput. Sci. 13(4): 165-182 (2012) - [c24]Janusz Górski, Katarzyna Lukasiewicz:
Agile Development of Critical Software - Can It be Justified?. ENASE 2012: 134-139 - [c23]Janusz Górski, Aleksander Jarzebowicz, Jakub Miler, Michal Witkowicz, Jakub Czyznikiewicz, Patryk Jar:
Supporting Assurance by Evidence-Based Argument Services. SAFECOMP Workshops 2012: 417-426 - 2011
- [j9]Lukasz Cyra, Janusz Górski:
SCF - A framework supporting achieving and assessing conformity with standards. Comput. Stand. Interfaces 33(1): 80-95 (2011) - [j8]Janusz Górski, Michal Witkowicz:
Experience with instantiating an automated testing process in the context of incremental and evolutionary software development. e Informatica Softw. Eng. J. 5(1): 51-63 (2011) - [j7]Lukasz Cyra, Janusz Górski:
Support for argument structures review and assessment. Reliab. Eng. Syst. Saf. 96(1): 26-37 (2011) - 2010
- [c22]Grzegorz Golaszewski, Janusz Górski:
Context Sensitive Privacy Management in a Distributed Environment. OTM Conferences (1) 2010: 639-655
2000 – 2009
- 2008
- [c21]Lukasz Cyra, Janusz Górski:
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application. DepCoS-RELCOMEX 2008: 95-102 - [c20]Lukasz Cyra, Janusz Górski:
An Approach to Evaluation of Arguments in Trust Cases. DepCoS-RELCOMEX 2008: 103-110 - [c19]Lukasz Cyra, Janusz Górski:
Expert Assessment of Arguments: A Method and Its Experimental Evaluation. SAFECOMP 2008: 291-304 - 2007
- [c18]Lukasz Cyra, Janusz Górski:
Supporting Compliance with Security Standards by Trust Case Templates. DepCoS-RELCOMEX 2007: 91-98 - [c17]Janusz Górski, Grzegorz Golaszewski, Jakub Miler, Maciej Piechowka, Heribert Baldus:
Trustworthiness: safety, security and privacy issues. ICECS 2007: 641-644 - [c16]Lukasz Cyra, Janusz Górski:
Extending GQM by Argument Structures. CEE-SET 2007: 26-39 - 2006
- [j6]Aleksander Jarzebowicz, Janusz Górski:
Empirical Evaluation of Reading Techniques for UML Models Inspection. Int. Trans. Syst. Sci. Appl. 1(2): 103-110 (2006) - [c15]Rafal Leszczyna, Janusz Górski:
Performance analysis of untraceability protocols for mobile agents using an adaptable framework. AAMAS 2006: 1063-1070 - [c14]Grzegorz Golaszewski, Janusz Górski:
Hazard Prevention by Forced Time Constraints. DepCoS-RELCOMEX 2006: 84-91 - [c13]Marek Zagorski, Janusz Górski:
An Approach for Evaluating Trust in IT Infrastructure. DepCoS-RELCOMEX 2006: 92-99 - [e2]Janusz Górski:
Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings. Lecture Notes in Computer Science 4166, Springer 2006, ISBN 3-540-45762-3 [contents] - 2005
- [j5]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
Trust case: justifying trust in an IT solution. Reliab. Eng. Syst. Saf. 89(1): 33-47 (2005) - [c12]Rafal Leszczyna, Janusz Górski:
Untraceability of mobile agents. AAMAS 2005: 1233-1234 - [p3]Janusz Górski:
How can we justify trust in software based systems? Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 3-12 - [p2]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
Tool support for detecting defects in object-oriented models. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 103-112 - [p1]Janusz Górski, Marcin Olszewski:
A model-based approach to analysis of authentication protocols. Information Processing and Security Systems 2005: 187-196 - 2003
- [j4]Janusz Zalewski, Wolfgang D. Ehrenberger, Francesca Saglietti, Janusz Górski, Andrew J. Kornecki:
Safety of computer control systems: challenges and results in software development. Annu. Rev. Control. 27(1): 23-37 (2003) - [c11]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
An Approach to Trust Case Development. SAFECOMP 2003: 193-206 - 2001
- [c10]Jakub Miler, Janusz Górski:
Software support for collaborative risk management. ACS 2001: 325-334 - [c9]Tadeusz Cichocki, Janusz Górski:
Formal Support for Fault Modelling and Analysis. SAFECOMP 2001: 190-199 - 2000
- [c8]Tadeusz Cichocki, Janusz Górski:
Failure Mode and Effect Analysis for Safety-Critical Systems with Software Components. SAFECOMP 2000: 382-394
1990 – 1999
- 1998
- [c7]Bartosz Nowicki, Janusz Górski:
Object Oriented Safety Analysis of an Extra High Voltage Substation Bay. SAFECOMP 1998: 306-315 - 1996
- [c6]Janusz Górski, Andrzej Wardzinski:
Deriving Real-Time Requirements for Software from Safety Analysis. RTS 1996: 9-14 - [c5]Janusz Górski, Bartosz Nowicki:
Safety Analysis Based on Object-oriented Modelling of Critical Systems. SAFECOMP 1996: 46-60 - 1995
- [c4]Janusz Górski:
Software Engineering Education: A Dragging-Through Approach. CSEE 1995: 31-44 - [c3]Janusz Górski, Jan Magott, Andrzej Wardzinski:
Modeling Fault Trees Using Petri Nets. SAFECOMP 1995: 90-100 - 1994
- [c2]Janusz Górski, Andrzej Wardzinski:
Formal specification and verification of a real-time kernel. RTS 1994: 205-211 - 1993
- [e1]Janusz Górski:
The 12th International Conference on Computer Safety, Reliability and Security, SAFECOMP 1993, Poznań-Kiekrz, Poland, October 27-29, 1993. Springer 1993, ISBN 978-3-540-19838-3 [contents]
1980 – 1989
- 1987
- [j3]Janusz Górski, Henryk J. Napiatek:
Formal specification of basic mechanisms of a message passing kernel. Microprocess. Microprogramming 21(1-5): 213-221 (1987)
1970 – 1979
- 1978
- [j2]Janusz Górski:
A Modular Representation of the Access Control System. ACM SIGOPS Oper. Syst. Rev. 12(3): 61-77 (1978) - [j1]Janusz Górski:
Sticky variables and memory optimization. ACM SIGPLAN Notices 13(6): 38-48 (1978) - 1976
- [c1]Janusz Górski:
On Consecutive Storage of Records. MFCS 1976: 304-310
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint